Sciweavers

3504 search results - page 104 / 701
» Secure protocol composition
Sort
View
92
Voted
WECWIS
2002
IEEE
106views ECommerce» more  WECWIS 2002»
15 years 7 months ago
I-DG: A Secure Protocol for Disseminating Data to Subscribers via IP Multicast
This paper proposes the IP Multicast-enabled Drop Groups (I-DG) protocol as a solution to the problem of efficiently and securely disseminating information to a large number of s...
Aslihan Celik, JoAnne Holliday, Bindumadhavi Ramav...
IJNSEC
2006
75views more  IJNSEC 2006»
15 years 2 months ago
Cryptanalysis of the Secure Sessions from Weak Secrets Protocols
The Short Secret Sharing Protocols (S3P), proposed by Roe et al in 1998 [13] and revised in 2003 [14], is a family of protocols that bootstrap secure session keys from weak secret...
Jolyon Clulow
116
Voted
IEEESCC
2009
IEEE
15 years 9 months ago
Dynamic Service Composition in Ambient Intelligence Environment
In Ambient Intelligence (AmI) environments, some services provided by AmI devices are often not visible to users and to other devices. The existing approaches deal with services...
Yazid Benazzouz, Nicolas Sabouret, Belkacem Chikha...
146
Voted
ACISP
2008
Springer
15 years 9 months ago
Secure Biometric Authentication with Improved Accuracy
Abstract. We propose a new hybrid protocol for cryptographically secure biometric authentication. The main advantages of the proposed protocol over previous solutions can be summar...
Manuel Barbosa, Thierry Brouard, Stéphane C...
131
Voted
WS
2005
ACM
15 years 8 months ago
Secure time synchronization service for sensor networks
In this paper, we analyze attacks on existing time synchronization protocols for wireless sensor networks. We propose a secure time synchronization toolbox to counter these attack...
Saurabh Ganeriwal, Srdjan Capkun, Chih-Chieh Han, ...